Sciweavers

1396 search results - page 70 / 280
» aim 2006
Sort
View
IJISEC
2010
87views more  IJISEC 2010»
14 years 8 months ago
How to construct identity-based signatures without the key escrow problem
The inherent key escrow problem is one of the main reasons for the slow adoption of identity-based cryptography. The existing solution for mitigating the key escrow problem is by a...
Tsz Hon Yuen, Willy Susilo, Yi Mu
JSS
2010
111views more  JSS 2010»
14 years 8 months ago
Promoting the development of secure mobile agent applications
In this paper we present a software architecture and a development environment for the implementation of applications based on secure mobile agents. Recent breakthroughs in mobile...
Carles Garrigues, Sergi Robles, Joan Borrell, Guil...
JUCS
2010
121views more  JUCS 2010»
14 years 8 months ago
Some Views on Information Fusion and Logic Based Approaches in Decision Making under Uncertainty
: Decision making under uncertainty is a key issue in information fusion and logic based reasoning approaches. The aim of this paper is to show noteworthy theoretical and applicati...
Yang Xu, Jun Liu, Luis Martínez, Da Ruan
PSYCHNOLOGY
2010
120views more  PSYCHNOLOGY 2010»
14 years 8 months ago
Exploring Self-Presence in Collaborative Virtual Teams
The concept of self-presence provides a framework for understanding how people connect to virtual self-representations on three distinct levels (body, emotions, and identity). The...
Rabindra Ratan, Béatrice S. Hasler
PUC
2010
121views more  PUC 2010»
14 years 8 months ago
The BehaviorScope framework for enabling ambient assisted living
Abstract The in-house monitoring of elders using intelligent sensors is a very desirable service that has the potential of increasing autonomy and independence while minimizing the...
Athanasios Bamis, Dimitrios Lymberopoulos, Thiago ...